PpbWould you like to join the leading international intergovernmental organization? /b /p pThe Centre for Maritime Research and Experimentation (CMRE) is an established, world‑class scientific research and experimentation facility that organizes and conducts scientific research and technology development centred on the maritime domain. It delivers innovative and field‑tested science and technology (ST) solutions to address defence and security needs of the Alliance. /p h3Responsibilities /h3 ul liImplement and operate security controls within accreditation frameworks for enterprise systems, networks, and critical infrastructure including autonomous vehicles and data acquisition. /liliManage and maintain communication and information systems including network devices, firewalls, and virtualized security environments. /liliConduct security testing, breach analysis, and root cause investigations to identify vulnerabilities and implement remediation strategies. /liliMonitor, analyse, and respond to security alerts and incidents using advanced threat detection tools while maintaining comprehensive incident documentation and reporting. /liliPerform vulnerability assessments, penetration testing, and security evaluations to identify and address weaknesses across IT infrastructure. /liliDeliver security awareness training to staff and ensure ongoing compliance with regulatory requirements and organizational security policies. /liliDesign, develop, and maintain security architectures for enterprise, cloud, and hybrid environments incorporating threat modelling and risk management principles. /liliAssess and ensure compliance with security frameworks, conduct audits, document findings, and drive continuous improvement initiatives. /liliProvide strategic guidance on emerging technologies, risk mitigation strategies, and alignment of security controls with business objectives. /liliWork with software development teams to ensure secure software development lifecycle in employed and create guidelines and material to document the security aspects. /liliAudit source code to ensure compliance with security frameworks, document findings, and work with developer to increase the security posture of the code. /liliConduct penetration test and vulnerability scanning, adapting/defining frameworks and processes to ensure software application are secure across the whole life cycle. /li /ul h3Essential Qualifications Experience /h3 ul liA minimum requirement of a bachelor’s degree at a nationally recognised/certified University in an information systems, physics or electronics related scientific or engineering discipline. /liliA minimum of 3 years of experience in design, develop, and maintain robust security architectures for IT systems, networks, and applications. /liliDeep knowledge of networking, cloud, and application security architectures. /liliExtensive background in defining security principles, technical requirements, and preventative controls for enterprise, cloud, and hybrid environments. /liliExtensive background in planning, executing, and leading security audits across systems, applications, and networks. /liliExtensive background in assessing compliance with NATO Enterprise security policies, ISO/IEC 27001, NIST, and other regulatory frameworks. /liliExtensive background in supporting development and enforcement of organization-wide security policies, standards, and procedures. /liliEthical mind-set with commitment to privacy, compliance, and IT governance. /liliDeep understanding of cybersecurity frameworks including ISO/IEC 27001, NIST SP-800 series, GDPR, and industry‑specific regulatory requirements with ability to translate standards into practical security controls. /liliIndustry‑recognized security certifications such as CISSP, CISM, CRISC, CISA, CompTIA Security+, or equivalent credentials demonstrating commitment to professional development. /liliProfessional hands‑on expertise with enterprise security tools including firewalls, intrusion detection and prevention systems, security information and event management (SIEM) platforms, and identity and access management solutions. /liliStrong capability to analyze security breaches, identify root causes, assess complex vulnerabilities, and develop effective remediation strategies based on technical evidence and threat intelligence. /liliExcellent ability to document technical security architecture, produce comprehensive reports, write Standard Operating Procedures, communicate risk to stakeholders at all levels, and work effectively across multidisciplinary teams. /liliGood level of spoken and written English. /li /ul pIf you've read the description and feel this role is a great match, we'd love to hear from you! Click "Apply for this job" to be directed to a brief questionnaire. It should only take a few moments to complete, and we'll be in touch promptly if your experience aligns with our needs. /p /p #J-18808-Ljbffr